Skip to content

FourCoreLabs/spring4shell-exploit-poc

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Spring4Shell Exploit POC

Exploit a Spring Application vulnerable to the Spring4Shell vulnerability. Read more about Spring4shell on our blog.

Usage

Requirements: Docker and docker-compose

$ ./exploit.sh 

asciicast

Vulnerable Spring Application

The vulnerable Spring application contains a GET and POST request handler for /helloworld/greeting. The exploit.sh script starts the app container running Tomcat 9.0 with the application packaged as a WAR and uses curl to write a webshell to http://localhost:8080/shell.jsp. The shell is used to grab the flag present at /flag inside the container's filesystem.

CVE-2022-22965

The CVE-2022-22965 with a CVSS score of 9.8 has been to the vulnerability in Spring Core allowing Remote Code Execution. The exploit is easy to achieve and hence the high CVSS score, pre-requisites for the exploit are:

  • JDK version 9+
  • Application built on Spring Or derived frameworks
  • Running Tomcat with WAR deployment

Resources

Credits

Based on the exploit and application by reznok.

About

Exploit a vulnerable Spring application with the Spring4Shell (CVE-2022-22965) Vulnerability.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published